unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Companies Didn’t Prioritize Third-Party Sources of CVEs, Here’s What Happened
Last December, Veracode reported that more than a third of Java applications still use vulnerable v...
2024-4-19 04:1:36 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
azul
log4j
cves
log4shell
What Makes Containers Vulnerable?
When looking for sensitive information and other valuable assets, attackers rarely access their tar...
2024-4-19 03:4:15 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
containers
network
mend
USENIX Security ’23 – NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers
Authors/Presenters: *Yehuda Afek and Anat Bremler-Barr, Shani Stajnrod*Many thanks to...
2024-4-19 03:0:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
bremler
marc
DevOps pioneers navigate organizational transformation
read file error: read notes: is a directory...
2024-4-19 01:49:47 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
sonatype
pioneers
webinar
catalyzing
bloggers
To Breach or Not to Breach
The rapid adoption of could computing was yesterday’s news 5 years ago. Today’s news is that one of...
2024-4-19 01:6:54 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
efficiency
operational
efficacy
cloud
Randall Munroe’s XKCD ‘Eclipse Path Maps’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-4-19 01:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
usenix
software
What to Consider When Choosing a Software Composition Analysis (SCA) Tool
Given the widespread use of third-party components in application development, identify...
2024-4-19 00:46:54 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
analysis
software
development
House Passes Privacy-Preserving Bill, but Biden Blasts it
“Threatens national security.” The White House is no fan of the FANFSA bill.The Fourth Amendment is...
2024-4-19 00:31:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
bill
brokers
warrant
amendment
buying
DataDome Renews SOC 2 Type 2 Compliance
As we continue maintaining a secure environment for our customers’ data, we are thrill...
2024-4-19 00:15:57 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
datadome
commitment
uphold
validates
Fixing a $12bn Challenge for Banks Through Data-Centric Security
The challenges presented by cyber risk have always loomed large for IT and business...
2024-4-18 23:34:45 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
12bn
comforte
security
leaders
syndicated
USENIX Security ’23 – Fourteen Years in the Life: A Root Server’s Perspective on DNS Resolver Security
Authors/Presenters: *Alden Hilton, Casey Deccio, Jacob Davis,*Many thanks to USENIX f...
2024-4-18 23:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
usenix
security
presenters
marriott
Strengthening Cyber Resilience: A Milestone Partnership
As the CEO of HYAS, I am thrilled to announce a pivotal partnership with ZainTECH, a trailblaze...
2024-4-18 22:30:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
hyas
zaintech
threats
proactive
Understanding the Different Types of Audit Evidence
Audit evidence lies at the heart of cybersecurity audits and assessments, providing tangible proof...
2024-4-18 21:43:41 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
audits
auditors
processes
Stale Accounts in Active Directory
What are Stale Accounts in Active Directory?Accounts that have not been used in the pa...
2024-4-18 20:44:55 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
stale
enzoic
inactive
syndicated
remained
Why Understanding Your Open Source Licenses Matters
When choosing software for a project, developers have a number of factors to consider. Prime on th...
2024-4-18 20:30:6 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
software
gitguardian
security
licensing
bsl
DAST is dead, why Business Logic Security Testing takes center stage
“DAST is dead”—that’s the phrase that appears every year on social media and in cybersecurity news...
2024-4-18 20:0:47 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
dast
zap
sdlc
Roku experiences another data breach; Apple notifies users about mercenary spyware attacks
It’s rare to see a data breach study observers call a “mixed bag.” Normally, reports on data breach...
2024-4-18 19:30:28 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
roku
spyware
blackcloak
mercenary
experienced
April Product Update
The CyberSaint team is dedicated to providing new features to CyberStrong and advan...
2024-4-18 19:15:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
cybersaint
cyberstrong
syndicated
bloggers
network
OnlyFans Filter: A New Frontier in School Safety and CIPA Compliance
TikTok, YouTube, Instagram — the list goes on. Every day, K-12 IT departments are contending with a...
2024-4-18 19:9:20 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
onlyfans
sexual
adult
What is certificate discovery and why is it important?
Digital certificates ensure cybersecurity, but visibility into inventory is crucial. Explore certif...
2024-4-18 17:39:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
clm
identify
expiration
validity
Previous
141
142
143
144
145
146
147
148
Next